Sciweavers

283 search results - page 9 / 57
» Software Inspections We Can Trust
Sort
View
SACMAT
2005
ACM
14 years 29 days ago
Peer-to-peer access control architecture using trusted computing technology
It has been recognized for some time that software alone does not provide an adequate foundation for building a high-assurance trusted platform. The emergence of industry-standard...
Ravi S. Sandhu, Xinwen Zhang
IWPC
2009
IEEE
14 years 2 months ago
Variable granularity for improving precision of impact analysis
Impact analysis is a specialized process of program comprehension that investigates the nature and extent of a planned software change. Traditionally, impact analysis inspects dep...
Maksym Petrenko, Václav Rajlich
CSCW
1994
ACM
13 years 11 months ago
From Implementation to Design: Tailoring and the Emergence of Systematization in CSCW
In this paper, we look at how people working in a governmental labor inspection agency tailor their shared PC environment. Starting with standard off-the-shelf software, the tailo...
Randall H. Trigg, Susanne Bødker
FOSAD
2007
Springer
14 years 1 months ago
Trusted Mobile Platforms
This article addresses two main topics. Firstly, we review the operation of trusted computing technology, which now appears likely to be implemented in future mobile devices (inclu...
Eimear Gallery, Chris J. Mitchell
TRUST
2010
Springer
14 years 14 days ago
SBAP: Software-Based Attestation for Peripherals
Abstract. Recent research demonstrates that adversaries can inject malicious code into a peripheral’s firmware during a firmware update, which can result in password leakage or...
Yanlin Li, Jonathan M. McCune, Adrian Perrig